default search action
International Journal of Network Security, Volume 13
Volume 13, Number 1, July 2011
- Laszlo Gyongyosi, Sándor Imre:
Quantum Informational Divergence in Quantum Channel Security Analysis. 1-12 - Mina Malekzadeh, Abdul Azim Abdul Ghani, Shamala Subramaniam, Jalil M. Desa:
Validating Reliability of OMNeT++ in Wireless Networks DoS Attacks: Simulation vs. Testbed. 13-21 - Nikolay A. Moldovyan:
Blind Signature Protocols from Digital Signature Standards. 22-30 - Adesina S. Sodiya, Olusegun Folorunso, Saidat Adebukola Onashoga, Omoniyi Paul Ogunderu:
An Improved Semi-Global Alignment Algorithm for Masquerade Detection. 31-40 - Chin-Ling Chen, Yeong-Lin Lai, Chih-Cheng Chen, Yong-Yuan Deng, Yu-Cheng Hwang:
RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards. 41-48 - Mohamed M. Nasreldin Rasslan:
A Stamped Hidden-signature Scheme Utilizing The Elliptic Curve Discrete Logarithm Problem. 49-57 - Debiao He, Jianhua Chen, Jin Hu:
Weaknesses of a Remote User Password Authentication Scheme Using Smart Card. 58-60
Volume 13, Number 2, September 2011
- Kitae Kim, Ikkwon Yie, Seongan Lim, Daehun Nyang:
Batch Verification and Finding Invalid Signatures in a Group Signature Scheme. 61-70 - Wei Hu, Kaiping Xue, Peilin Hong, Chuchu Wu:
ATCS: A Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks. 71-78 - Tarek S. Sobh, Mohamed Ibrahiem Amer:
PGP Modification for Securing Digital Envelope Mail Using COM+ and Web Services. 79-91 - Marimuthu Rajaram, Thilagavathy Dorairaj Suresh:
An Interval-based Contributory Key Agreement. 92-97 - Sandeep K. Sood, Anil Kumar Sarje, Kuldip Singh:
Inverse Cookie-based Virtual Password Authentication Protocol. 98-108 - Celia Li, Zhuang Wang, Cungang Yang:
Secure Routing for Wireless Mesh Networks. 109-120
Volume 13, Number 3, November 2011
- Mohamed Salah Bouassida:
Authentication vs. Privacy within Vehicular Ad Hoc Networks. 121-134 - Ted Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung:
The Efficient Dual Receiver Cryptosystem and Its Applications. 135-151 - J. Udhayan, T. Hamsapriya:
Statistical Segregation Method to Minimize the False Detections During DDoS Attacks. 152-160 - Xingwen Zhao, Fangguo Zhang:
A New Type of ID-based Encryption System and Its Application to Pay-TV Systems. 161-166 - Manoj Kumar, Mridul Kumar Gupta, Saru Kumari:
An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks. 167-177 - Xingwen Zhao, Fangguo Zhang:
Analysis on Hu et al.'s Identity-based Broadcast Encryption. 178-180
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.